The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Juan M. Estévez-Tapiador: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Esther Palomar, Juan M. Estévez-Tapiador, Julio César Hernández Castro, Arturo Ribagorda
    A Protocol for Secure Content Distribution in Pure P2P Networks. [Citation Graph (0, 0)][DBLP]
    DEXA Workshops, 2006, pp:712-716 [Conf]
  2. Almudena Alcaide, Juan M. Estévez-Tapiador, Julio César Hernández Castro, Arturo Ribagorda
    An Extended Model of Rational Exchange Based on Dynamic Games of Imperfect Information. [Citation Graph (0, 0)][DBLP]
    ETRICS, 2006, pp:396-408 [Conf]
  3. Esther Palomar, Juan M. Estévez-Tapiador, Julio César Hernández Castro, Arturo Ribagorda
    A P2P Content Authentication Protocol Based on Byzantine Agreement. [Citation Graph (0, 0)][DBLP]
    ETRICS, 2006, pp:60-72 [Conf]
  4. Esther Palomar, Juan M. Estévez-Tapiador, Julio César Hernández Castro, Arturo Ribagorda
    Security in P2P Networks: Survey and Research Directions. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2006, pp:183-192 [Conf]
  5. Almudena Alcaide, Juan M. Estévez-Tapiador, Antonio Izquierdo, José María Sierra
    A Formal Analysis of Fairness and Non-repudiation in the RSA-CEGD Protocol. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2005, pp:1309-1318 [Conf]
  6. Juan M. Estévez-Tapiador, Pedro Garcia-Teodoro, Jesús E. Díaz-Verdejo
    N3: A Geometrical Approach for Network Intrusion Detection at the Application Layer. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:841-850 [Conf]
  7. Antonio Izquierdo Manzanares, Joaquín Torres Márquez, Juan M. Estévez-Tapiador, Julio César Hernández Castro
    Attacks on Port Knocking Authentication Mechanism. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2005, pp:1292-1300 [Conf]
  8. Pedro Peris-Lopez, Julio César Hernández Castro, Juan M. Estévez-Tapiador, Arturo Ribagorda
    RFID Systems: A Survey on Security Threats and Proposed Solutions. [Citation Graph (0, 0)][DBLP]
    PWC, 2006, pp:159-170 [Conf]
  9. Juan M. Estévez-Tapiador, Pedro Garcia-Teodoro, Jesús E. Díaz-Verdejo
    Detection of Web-Based Attacks through Markovian Protocol Parsing. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:457-462 [Conf]
  10. Gabriel Maciá-Fernández, Jesús E. Díaz-Verdejo, Juan M. Estévez-Tapiador
    PIM-DM Cost Analysis in Loop Free Topologies. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:719-723 [Conf]
  11. Juan M. Estévez-Tapiador, Pedro Garcia-Teodoro, Jesús E. Díaz-Verdejo
    Stochastic Protocol Modeling for Anomaly Based Network Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    IWIA, 2003, pp:3-12 [Conf]
  12. Pedro Peris-Lopez, Julio César Hernández Castro, Juan M. Estévez-Tapiador, Arturo Ribagorda
    EMAP: An Efficient Mutual-Authentication Protocol for Low-Cost RFID Tags. [Citation Graph (0, 0)][DBLP]
    OTM Workshops (1), 2006, pp:352-361 [Conf]
  13. Esther Palomar, Juan M. Estévez-Tapiador, Julio César Hernández Castro, Arturo Ribagorda
    Certificate-based Access Control in Pure P2P Networks. [Citation Graph (0, 0)][DBLP]
    Peer-to-Peer Computing, 2006, pp:177-184 [Conf]
  14. Carlos Lamenca-Martinez, Julio César Hernández Castro, Juan M. Estévez-Tapiador, Arturo Ribagorda
    Lamar: A New Pseudorandom Number Generator Evolved by Means of Genetic Programming. [Citation Graph (0, 0)][DBLP]
    PPSN, 2006, pp:850-859 [Conf]
  15. Pedro Peris-Lopez, Julio César Hernández Castro, Juan M. Estévez-Tapiador, Arturo Ribagorda
    M2AP: A Minimalist Mutual-Authentication Protocol for Low-Cost RFID Tags. [Citation Graph (0, 0)][DBLP]
    UIC, 2006, pp:912-923 [Conf]
  16. Juan M. Estévez-Tapiador, Pedro Garcia-Teodoro, Jesús E. Díaz-Verdejo
    NSDF: a computer network system description framework and its application to network security. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2003, v:43, n:5, pp:573-600 [Journal]
  17. Juan M. Estévez-Tapiador, Pedro Garcia-Teodoro, Jesús E. Díaz-Verdejo
    Measuring normality in HTTP traffic for anomaly-based intrusion detection. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2004, v:45, n:2, pp:175-193 [Journal]
  18. Juan M. Estévez-Tapiador, Pedro Garcia-Teodoro, Jesús E. Díaz-Verdejo
    Anomaly detection methods in wired networks: a survey and taxonomy. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2004, v:27, n:16, pp:1569-1584 [Journal]
  19. Julio César Hernández Castro, Ignacio Blasco-Lopez, Juan M. Estévez-Tapiador, Arturo Ribagorda Garnacho
    Steganography in games: A general methodology and its application to the game of Go. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2006, v:25, n:1, pp:64-71 [Journal]
  20. Juan M. Estévez-Tapiador
    Moving Web Services to the Secure Side. [Citation Graph (0, 0)][DBLP]
    IEEE Distributed Systems Online, 2004, v:5, n:1, pp:- [Journal]
  21. Juan M. Estévez-Tapiador
    Concepts and Attitudes for Internet Security (A review of Firewalls and Internet Security: Repelling the Wily Hacker, Second Edition by William R. Cheswick, Steven M. Bellovin, and Aviel D. Rubin). [Citation Graph (0, 0)][DBLP]
    IEEE Distributed Systems Online, 2003, v:4, n:10, pp:- [Journal]
  22. Juan M. Estévez-Tapiador
    The Emergence of Cyber-Terrorism. [Citation Graph (0, 0)][DBLP]
    IEEE Distributed Systems Online, 2004, v:5, n:10, pp:- [Journal]
  23. Juan M. Estévez-Tapiador
    Book Review: Practical Intrusion Prevention. [Citation Graph (0, 0)][DBLP]
    IEEE Distributed Systems Online, 2006, v:7, n:6, pp:- [Journal]
  24. Esther Palomar, Juan M. Estévez-Tapiador, Julio César Hernández Castro, Arturo Ribagorda
    Dealing with Sporadic Strangers, or the (Un)Suitability of Trust for Mobile P2P Security. [Citation Graph (0, 0)][DBLP]
    DEXA Workshops, 2007, pp:779-783 [Conf]
  25. Almudena Alcaide, Juan M. Estévez-Tapiador, Julio César Hernández Castro, Arturo Ribagorda
    A Multi-party Rational Exchange Protocol. [Citation Graph (0, 0)][DBLP]
    OTM Workshops (1), 2007, pp:42-43 [Conf]
  26. Esther Palomar, Almudena Alcaide, Juan M. Estévez-Tapiador, Julio César Hernández Castro
    Bayesian Analysis of Secure P2P Sharing Protocols. [Citation Graph (0, 0)][DBLP]
    OTM Conferences (2), 2007, pp:1701-1717 [Conf]

  27. An Efficient Authentication Protocol for RFID Systems Resistant to Active Attacks. [Citation Graph (, )][DBLP]


  28. Evolving High-Speed, Easy-to-Understand Network Intrusion Detection Rules with Genetic Programming. [Citation Graph (, )][DBLP]


  29. On the Salsa20 Core Function. [Citation Graph (, )][DBLP]


  30. Towards Automated Design of Multi-party Rational Exchange Security Protocols. [Citation Graph (, )][DBLP]


  31. Non-linear Cryptanalysis Revisited: Heuristic Search for Approximations to S-Boxes. [Citation Graph (, )][DBLP]


  32. Nature-Inspired Synthesis of Rational Protocols. [Citation Graph (, )][DBLP]


  33. Steganalysis of Hydan. [Citation Graph (, )][DBLP]


  34. CSteg: Talking in C Code - Steganography of C Source Code in Text. [Citation Graph (, )][DBLP]


  35. Advances in Ultralightweight Cryptography for Low-Cost RFID Tags: Gossamer Protocol. [Citation Graph (, )][DBLP]


  36. Heuristic search for non-linear cryptanalytic approximations. [Citation Graph (, )][DBLP]


  37. Non-standard Attacks against Cryptographic Protocols, with an Example over a Simplified Mutual Authentication Protocol. [Citation Graph (, )][DBLP]


  38. Secure content access and replication in pure P2P networks. [Citation Graph (, )][DBLP]


  39. Cryptanalysis of the SASI Ultralightweight RFID Authentication Protocol with Modular Rotations [Citation Graph (, )][DBLP]


  40. Cryptanalysis of the RSA-CEGD protocol [Citation Graph (, )][DBLP]


  41. Shedding Some Light on RFID Distance Bounding Protocols and Terrorist Attacks [Citation Graph (, )][DBLP]


  42. Security Flaws in a Recent Ultralightweight RFID Protocol [Citation Graph (, )][DBLP]


Search in 0.181secs, Finished in 0.183secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002